ruchikagargdiwakar / ml_cyber_security_usecases
This project contains files for cyber security
☆31Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ml_cyber_security_usecases
- This project contains 10010 ELF files (6165 IoT Botnet of different variant and 3845 benign files)☆9Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆58Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆54Updated last year
- This is a paper list about Machine Learning for IDSes☆86Updated 2 months ago
- An IDS implementation using machine learning☆36Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 4 years ago
- Adversarial Malware Generator Using GANs☆51Updated 3 months ago
- ☆30Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆128Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆97Updated 4 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆193Updated 6 months ago
- ☆18Updated 3 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆15Updated 4 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- ☆24Updated last year
- NLP model and tech for cyber security tasks☆78Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆36Updated 4 months ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆33Updated 6 months ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆115Updated 6 years ago
- Transfer Learning for Image-Based Malware Classification☆47Updated 2 years ago
- Machine Learning For Cybersecurity.☆62Updated 5 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆48Updated 7 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆14Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆20Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆18Updated 3 months ago